"Big four" accounting firm Deloitte suffered a breach last year that may have exposed 5 million internal emails as well as usernames and passwords, client information and health details, the Guardian reports.

Organizations that must comply with Europe's GDPR need to identify gaps in their ability to meet various requirements, including making prompt breach notifications and gaining consumers' consent to store their data, says Sunil Chand of Grant Thornton.

Network by network, device by device, today's security threats spread through an organization like wildfire. But Druce MacFarlane of Bricata says security leaders are making fundamental mistakes with their focus on perimeter and endpoint security.

In recent years, highly publicized data breaches have elevated the need for vendor risk management. In this year's Verizon DBIR report, 70% of incidents observed involved a secondary victim where the victims were targeted and infected through an unknowing third party, like a vendor.
Yet despite the alarming number...

As organizations today rely more and more on outsourcing, companies have become increasingly hyper connected. With this change comes greater vulnerability, which is passed along to you as the insurer.
However, if you use the right technology, you can identify this increased risk so you can write policies more...

Benchmarking security performance against peers and industry averages is one way organizations can get a true picture of just how secure they are.
Download this report to learn:
Why optimism bias is harmful to an enterprise risk management strategy
How to help identify security issues that traditional audits may...

Evaluate your cybersecurity policies and controls to lower your cyber risk.
Download this whitepaper that presents how organizations can reduce their cyber risk by embracing responsible cybersecurity practices throughout their networks. It features an analysis of the cybersecurity posture of organizations of all...

Your company shares sensitive information with a number of organizations every day. And that means your security team has to find a way to keep this data secure as it filters through your company's ecosystem of partners, suppliers, vendors, resellers, and more.
Download this whitepaper that explains:
What types...

As targeted cyber security threats have continued to grow, IT professionals have become increasingly aware of their third-party partnerships. During the alignment between their business objectives and business contracts, many organizations are discovering a great need for automated, data-driven monitoring...

Traditional approaches to managing cyber risk typically include use risk assessment questionnaires and audits. The results of these are often interpreted with cyber threat matrices to provide a rough, qualitative snapshot of risk. Such strategies are time consuming, expensive, and it is unclear how effective they are....

In order to manage cyber risk for your company, you need the ability to understand your security performance, and then take action to strengthen it.
Download this whitepaper to learn:
Comparisons of network security risk against your peers, competitors, and partners
Identify cyber threats before they turn into...

Mergers and acquisitions (M&A) are commonplace in the business world. Unfortunately, so is cyber crime. According to a recent study, 78% of respondents said that cybersecurity is not analyzed or quantified in depth as part of their M&A due diligence process. If you are evaluating a new M&A, why would you neglect...

Despite a staggering rise in the exposures faced by global businesses from cyber attack, data theft or privacy violations, the insurance industry remains well capitalized and willing to supply substantial cover to organizations in the form of cyber insurance.
Download this whitepaper to learn about the unique...

In today's world of security breaches and cyber crimes, insurance buyers are seeking better protection. While general insurance companies are looking to exclude cyber risk coverage, the stand-alone cyber insurance market is growing and maturing rapidly.
Download this whitepaper that will explain:
Why harnessing...